User's Manual
Table Of Contents
- Chapter 1 Overview
- Chapter 2 Device Activation and Accessing
- Chapter 3 People Number Management
- Chapter 4 Temperature Measurement
- Chapter 5 Event and Alarm
- Chapter 6 Arming Schedule and Alarm Linkage
- Chapter 7 Live View
- Chapter 8 Video and Audio
- Chapter 9 Video Recording and Picture Capture
- Chapter 10 Network Settings
- 10.1 TCP/IP
- 10.3 Port
- 10.4 Port Mapping
- 10.5 Multicast
- 10.6 SNMP
- 10.7 Access to Device via Domain Name
- 10.8 Access to Device via PPPoE Dial Up Connection
- 10.9 Enable Hik-Connect Service on Camera
- 10.10 Set ISUP
- 10.11 Set Open Network Video Interface
- 10.12 Set Alarm Host
- 10.13 Set Alarm Server
- 10.14 Set Network Service
- 10.15 Set SRTP
- Chapter 11 System and Security
- 11.1 View Device Information
- 11.2 Search and Manage Log
- 11.3 Import and Export Configuration File
- 11.4 Export Diagnose Information
- 11.5 Reboot
- 11.6 Restore and Default
- 11.7 Upgrade
- 11.8 View Open Source Software License
- 11.9 Time and Date
- 11.10 Set RS-232
- 11.11 Set RS-485
- 11.12 Set Same Unit
- 11.13 Security
- 11.14 User and Account
- Chapter 12 Appendix
Thermal Presence Detector User Manual
47
11.13.2 Security Audit Log
The security audit logs refer to the security operation logs. You can search and analyze the security
log files of the device so as to find out the illegal intrusion and troubleshoot the security events.
Security audit logs can be saved on device internal storage. The log will be saved every half hour
after device booting. Due to limited storage space, you can also save the logs on a log server.
Search Security Audit Logs
You can search and analyze the security log files of the device so as to find out the illegal intrusion
and troubleshoot the security events.
Steps
Note
This function is only supported by certain camera models.
1. Go to Configuration → System → Maintenance → Security Audit Log.
2. Select log types, Start Time, and End Time.
3. Click Search.
The log files that match the search conditions will be displayed on the Log List.
4. Optional: Click Export to save the log files to your computer.
Set Log Server
The log server should support syslog (RFC 3164) over TLS.
Steps
1. Check Enable Log Upload Server.
2. Input Log Server IP and Log Server Port.
3. Click Test to test the settings.
4. Install client certificate.
1) Click Create to create the certificate request. Fill in the required information in the pop-up
window.
2) Click Download to download the certificate request and submit it to the trusted certificate
authority for signature.
3) Install the signed certificate to the device.
5. Install the CA certificate to the device.
11.13.3 Set IP Address Filter
IP address filter is a tool for access control. You can enable the IP address filter to allow or forbid
the visits from the certain IP addresses.
IP address refers to IPv4.










